Bridging the Bubbles: Connecting Academia and Industry in Cybersecurity Research

02/27/2023
by   Rasha Kashef, et al.
0

There is a perceived disconnect between how ad hoc industry solutions and academic research solutions in cyber security are developed and applied. Is there a difference in philosophy in how solutions to cyber security problems are developed by industry and by academia. What could academia and industry do to bridge this gap and speed up the development and use of effective cybersecurity solutions? This paper provides an overview of the most critical gaps and solutions identified by an interdisciplinary expert exchange on the topic. The discussion was held in the form of the webinar "Bridging the Bubbles: Connecting Academia and Industry in Cybersecurity Research" in November 2022 as part of the Rogers Cybersecure Catalyst webinar series. Panelists included researchers from academia and industry as well as experts from industry and business development. The key findings and recommendations of this exchange are supported by the relevant scientific literature on the topic within this paper. Different approaches and time frames in development and lifecycle management, challenges in knowledge transfer and communication as well as heterogeneous metrics for success in projects are examples of the evaluated subject areas.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
09/19/2020

A framework for effective corporate communication after cyber security incidents

A major cyber security incident can represent a cyber crisis for an orga...
research
09/02/2021

The Good, The Bad and The Missing: A Narrative Review of Cyber-security Implications for Australian Small Businesses

Small businesses (0-19 employees) are becoming attractive targets for cy...
research
03/24/2022

PREVIEW VERSION: Six Insights into 6G: Orientation and Input for Developing Your Strategic 6G Research Plan

This is the PREVIEW version of a paper about 6G. This paper is a summa...
research
01/30/2021

Gender Issues in Computer Science: Lessons Learnt and Reflections for the Future

Women are underrepresented in Computer Science disciplines at all levels...
research
07/17/2023

Are we there yet? An Industrial Viewpoint on Provenance-based Endpoint Detection and Response Tools

Provenance-Based Endpoint Detection and Response (P-EDR) systems are dee...
research
06/09/2023

Connecting the Dots of Knowledge in Agile Software Development

This article discusses the importance of managing knowledge as a resourc...

Please sign up or login with your details

Forgot password? Click here to reset